Click here to close now.


@CloudExpo Authors: Carmen Gonzalez, Pat Romanski, Elizabeth White, AppDynamics Blog, Blue Box Blog

Related Topics: @CloudExpo, Mobile IoT, Microservices Expo, Linux Containers, Containers Expo Blog, Agile Computing

@CloudExpo: Article

IronKey Morphs into Marble Cloud

Marble is meant to protect employee-owned iOS, Android, Windows and Linux mobile devices and desktop/laptop platforms

IronKey, the seven-year-old Internet security and privacy house, has changed its name to Marble Cloud in celebration of the introduction its new cloud security service.

Marble is meant to protect employee-owned iOS, Android, Windows and Linux mobile devices and desktop/laptop platforms.

The company says any user - contractor, remote worker, customer or supply chain partner - can securely access enterprise-provisioned public and private clouds from anywhere, on any of their own devices.

It's a hardened multi-layer environment that's supposed to be invulnerable - repeat, invulnerable - to Trojans, man-in-the-middle, man-in-the-browser, malevolent Wi-Fi networks, DNS poisoning and other state-of-the-threat attacks.

Being a toughie explains its less-than-fluffy new name.

Marble founder and CTO Dave Jevans says, "Internet and cloud security is fundamentally broken, and you don't need to look past the daily headlines about hackers' latest successes to know it."

Marble starts with the assumption that the endpoint and network connection are compromised.

IronKey originally got started on a grant from Homeland Security and subsequently did a lot of business with the US government.

The IronKey brand has just been turned over to Imation, which last year acquired the IronKey secure mobile storage business and products.

Jervans says, "IronKey is an extremely well-known brand in the security space, but it is very tightly tied to secure data storage; that identity now fits Imation's business better than ours. Today's name change marks an exciting new era and will help us to distinguish between our roots as the creators of the world's most secure storage and our future as the world's most secure way to surf the web and access cloud services, the brand identity we will build for Marble Cloud."

Marble, like iron, is a durable, hard object that lasts and lasts and, remembering his boyhood, Jervans explains that "marbles can contain internal secrets, like cats' eyes - or logins and secure documents - and keep them safe inside a hard shell - or a cryptographic container. You can carry marbles around in your pocket - or your smart phone, tablet or laptop - knowing they are ready to use yet secure. "

So then, Marble's cloud access management widgetry is supposed to secure BYOD and cloud services from any device, reducing costs, risks and complexity in today's extended IT infrastructures.

The solution is a combination of a Marble App, Marble Network and Marble Cloud management service. The company says it's nothing like detect-and-patch countermeasures such as antivirus, firewall and other signature-based solutions that remain vulnerable to zero-day attacks.

Employees and consultants can download and install the Marble App from anywhere. It's self-configuring based on policies defined by the enterprise on the Marble Cloud management service. The app is hardened and isolated from malware and keystroke loggers, which is said to be the safest way to access cloud services from any device.

The Marble Network is an on-the-go VPN service that encrypts all cloud access on any Wi-Fi hotspot in the world. Secure DNS with real-time blacklists prevents users from visiting phishing, malware distribution and other fraudulent web sites.

IT administrators use the Marble Cloud management service to define policies across PC and mobile device platforms for cloud access control, endpoint security, VPN configuration, cloud access whitelists, malware scanning and jailbreak detection.

A risk dashboard offers the admin full visibility and control including employee and consultant use of the system.

Marble Cloud will provide the widgetry to enterprises, banks and government agencies. It's supposed to protect users from malware on their own device and prevent data loss so companies feel safe enough from criminals, hactivists and malevolent nation-states to capitalize on cloud computing. It's also supposed to eliminate endpoint hardware and management costs.

More Stories By Maureen O'Gara

Maureen O'Gara the most read technology reporter for the past 20 years, is the Cloud Computing and Virtualization News Desk editor of SYS-CON Media. She is the publisher of famous "Billygrams" and the editor-in-chief of "Client/Server News" for more than a decade. One of the most respected technology reporters in the business, Maureen can be reached by email at maureen(at) or paperboy(at), and by phone at 516 759-7025. Twitter: @MaureenOGara

Comments (0)

Share your thoughts on this story.

Add your comment
You must be signed in to add a comment. Sign-in | Register

In accordance with our Comment Policy, we encourage comments that are on topic, relevant and to-the-point. We will remove comments that include profanity, personal attacks, racial slurs, threats of violence, or other inappropriate material that violates our Terms and Conditions, and will block users who make repeated violations. We ask all readers to expect diversity of opinion and to treat one another with dignity and respect.

@CloudExpo Stories
SYS-CON Events announced today the Containers & Microservices Bootcamp, being held November 3-4, 2015, in conjunction with 17th Cloud Expo, @ThingsExpo, and @DevOpsSummit at the Santa Clara Convention Center in Santa Clara, CA. This is your chance to get started with the latest technology in the industry. Combined with real-world scenarios and use cases, the Containers and Microservices Bootcamp, led by Janakiram MSV, a Microsoft Regional Director, will include presentations as well as hands-on...
Containers are all the rage among developers and web companies, but they also represent two very substantial benefits to larger organizations. First, they have the potential to dramatically accelerate the application lifecycle from software builds and testing to deployment and upgrades. Second they represent the first truly hybrid-approach to consuming infrastructure, allowing organizations to run the same workloads on any cloud, virtual machine or physical server. Together, they represent a ver...
As operational failure becomes more acceptable to discuss within the software industry, the necessity for holding constructive, actionable postmortems increases. But most of what we know about postmortems from "pop culture" isn't actually relevant for the software systems we work on and within. In his session at DevOps Summit, J. Paul Reed will look at postmortem pitfalls, techniques, and tools you'll be able to take back to your own environment so they will be able to lay the foundations for h...
Nowadays, a large number of sensors and devices are connected to the network. Leading-edge IoT technologies integrate various types of sensor data to create a new value for several business decision scenarios. The transparent cloud is a model of a new IoT emergence service platform. Many service providers store and access various types of sensor data in order to create and find out new business values by integrating such data.
Containers are changing the security landscape for software development and deployment. As with any security solutions, security approaches that work for developers, operations personnel and security professionals is a requirement. In his session at @DevOpsSummit, Kevin Gilpin, CTO and Co-Founder of Conjur, will discuss various security considerations for container-based infrastructure and related DevOps workflows.
There are so many tools and techniques for data analytics that even for a data scientist the choices, possible systems, and even the types of data can be daunting. In his session at @ThingsExpo, Chris Harrold, Global CTO for Big Data Solutions for EMC Corporation, will show how to perform a simple, but meaningful analysis of social sentiment data using freely available tools that take only minutes to download and install. Participants will get the download information, scripts, and complete en...
SYS-CON Events announced today that Super Micro Computer, Inc., a global leader in high-performance, high-efficiency server, storage technology and green computing, will exhibit at the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. Supermicro (NASDAQ: SMCI), the leading innovator in high-performance, high-efficiency server technology is a premier provider of advanced server Building Block Solutions® for Data ...
IT data is typically silo'd by the various tools in place. Unifying all the log, metric and event data in one analytics platform stops finger pointing and provides the end-to-end correlation. Logs, metrics and custom event data can be joined to tell the holistic story of your software and operations. For example, users can correlate code deploys to system performance to application error codes.
Achim Weiss is Chief Executive Officer and co-founder of ProfitBricks. In 1995, he broke off his studies to co-found the web hosting company "Schlund+Partner." The company "Schlund+Partner" later became the 1&1 web hosting product line. From 1995 to 2008, he was the technical director for several important projects: the largest web hosting platform in the world, the second largest DSL platform, a video on-demand delivery network, the largest eMail backend in Europe, and a universal billing syste...
Between the compelling mockups and specs produced by analysts, and resulting applications built by developers, there exists a gulf where projects fail, costs spiral, and applications disappoint. Methodologies like Agile attempt to address this with intensified communication, with partial success but many limitations. In his session at DevOps Summit, Charles Kendrick, CTO and Chief Architect at Isomorphic Software, will present a revolutionary model enabled by new technologies. Learn how busine...
Interested in leveraging automation technologies and a cloud architecture to make developers more productive? Learn how PaaS can benefit your organization to help you streamline your application development, allow you to use existing infrastructure and improve operational efficiencies. Begin charting your path to PaaS with OpenShift Enterprise.
Cloud computing delivers on-demand resources that provide businesses with flexibility and cost-savings. The challenge in moving workloads to the cloud has been the cost and complexity of ensuring the initial and ongoing security and regulatory (PCI, HIPAA, FFIEC) compliance across private and public clouds. Manual security compliance is slow, prone to human error, and represents over 50% of the cost of managing cloud applications. Determining how to automate cloud security compliance is critical...
Containers have changed the mind of IT in DevOps. They enable developers to work with dev, test, stage and production environments identically. Containers provide the right abstraction for microservices and many cloud platforms have integrated them into deployment pipelines. DevOps and containers together help companies achieve their business goals faster and more effectively. In his session at DevOps Summit, Ruslan Synytsky, CEO and Co-founder of Jelastic, will review the current landscape of...
“In the past year we've seen a lot of stabilization of WebRTC. You can now use it in production with a far greater degree of certainty. A lot of the real developments in the past year have been in things like the data channel, which will enable a whole new type of application," explained Peter Dunkley, Technical Director at Acision, in this interview at @ThingsExpo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
The Internet of Everything is re-shaping technology trends–moving away from “request/response” architecture to an “always-on” Streaming Web where data is in constant motion and secure, reliable communication is an absolute necessity. As more and more THINGS go online, the challenges that developers will need to address will only increase exponentially. In his session at @ThingsExpo, Todd Greene, Founder & CEO of PubNub, will explore the current state of IoT connectivity and review key trends an...
As a CIO, are your direct reports IT managers or are they IT leaders? The hard truth is that many IT managers have risen through the ranks based on their technical skills, not their leadership ability. Many are unable to effectively engage and inspire, creating forward momentum in the direction of desired change. Renowned for its approach to leadership and emphasis on their people, organizations increasingly look to our military for insight into these challenges.
Through WebRTC, audio and video communications are being embedded more easily than ever into applications, helping carriers, enterprises and independent software vendors deliver greater functionality to their end users. With today’s business world increasingly focused on outcomes, users’ growing calls for ease of use, and businesses craving smarter, tighter integration, what’s the next step in delivering a richer, more immersive experience? That richer, more fully integrated experience comes ab...
With major technology companies and startups seriously embracing IoT strategies, now is the perfect time to attend @ThingsExpo in Silicon Valley. Learn what is going on, contribute to the discussions, and ensure that your enterprise is as "IoT-Ready" as it can be! Internet of @ThingsExpo, taking place Nov 3-5, 2015, at the Santa Clara Convention Center in Santa Clara, CA, is co-located with 17th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading in...
DevOps Summit, taking place at the Santa Clara Convention Center in Santa Clara, CA, and Javits Center in New York City, is co-located with 17th Cloud Expo and will feature technical sessions from a rock star conference faculty and the leading industry players in the world. The widespread success of cloud computing is driving the DevOps revolution in enterprise IT. Now as never before, development teams must communicate and collaborate in a dynamic, 24/7/365 environment. There is no time to wait...
As-a-service models offer huge opportunities, but also complicate security. It may seem that the easiest way to migrate to a new architectural model is to let others, experts in their field, do the work. This has given rise to many as-a-service models throughout the industry and across the entire technology stack, from software to infrastructure. While this has unlocked huge opportunities to accelerate the deployment of new capabilities or increase economic efficiencies within an organization, i...